Privacidad – Una historia de desencuentros.

Slides:



Advertisements
Presentaciones similares
Cable & Wireless Panamá. Entrar a Inicio, Programas y buscar Windows Live.
Advertisements

Como Configurar el Internet
Windows Mobile 1. Configurar una cuenta de Correo Personal Configurar Yahoo! Microsoft Confidential2 Inicio Fin.
New Form Factors for Applications Introducción Windows Vista provee muchas formas para conectar al usuario con los datos –Colaboración usando Peer-to-Peer,
© 2006 Microsoft Corporation. All rights reserved.
3/24/2017 4:00 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
3/24/2017 4:02 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
PLEASE READ (hidden slide) This template uses Microsofts corporate font, Segoe Segoe is not a standard font included with Windows, so if you have not.
De BDC a BCS Gustavo Velez Overview El problema y la solución Arquitectura Listas Externas (SharePoint Designer) Visual Studio 2010.
Virtual Desktop Infrastructure (VDI) from Microsoft
3/29/ :02 AM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Mario Cortés Flores Consultor SharePoint en Renacimiento Coordinador SUGES Coautor de:
Infraestructura de la información crucial
Database Mounting Tool (Dsamain.exe) Mediante esta nueva herramienta y una de las mejoras de la nueva versión de Ntdsutil… podemos generar y examinar.
3/29/2017 1:27 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
LOW COST COMPUTER SYSTEM for QUALITY EVALUATION and PRESERVATION of GRAINS STORED in POLYMER BAGS Dra. Claudia Pons Researcher CONICET – LIFIA - CAETI.
Introducción a la nueva consola de administración de Exchange 2007 Angel Sánchez Clemares Ingeniero de Soporte David Cervigón IT.
Desarrollo Entrega continua Rodrigo Corral
Paulo Dias IT Pro Evangelist Microsoft Fernando Guillot IT Pro Evangelist Microsoft
Vendiendo Microsoft Office 2010 Office 2010 Licenciamiento Office 2010 Licenciamiento Pablo Rovira Jefe de Producto Pablo Rovira.
BITLOCKER Fernando Guillot Paulo Dias IT Pro Evangelist Microsoft
Antonio Gámir Optimized Desktop Specialist Microsoft Ibérica.
para desarrolladores Minimizar el cambio Concentrarse en estabilidad, confiabilidad y rendimiento. Ayudar a mejorar la productividad Reducir la curva.
Service Pack 3 SQL Server 2005 Marcos Celada Microsoft Support Services
David Cervigón Luna IT Pro Evangelist Microsoft Ibérica
Christopher Quesada Developer Evangelist Microsoft.
Se trata de un nuevo tipo de Controlador de Dominio No puede escribir en su base de datos fruto de peticiones externas No se le permite tener replicación.
Las PyMEs son máquinas de crecimiento PyMEs representan hasta un 75% de todos los empleos en algunas economías (PyMEs) con conocimientos en tecnología.
Paúl Andres Granja Padilla Rodolfo Ronald Villagrán Tomalá
© 2006 Microsoft Corporation. All rights reserved.
A demanda elástica De amplio Acceso Servicios medibles Recursos mancomunados.
Hogar y Micro Empresas Pequenas Empresas Medianas Empresas Enterprise 1-4 PCs 50+ PCs PCs PCs OEM Microsoft Open License Microsoft Open Value.
Creciendo Capacidades de los Socios!!. Agenda Presentación del Equipo Programa MPA (Microsoft Partner Academy) Canales de Comunicación - Redes Sociales.
Alejandro García Sánchez Readiness Champion.. Licenciamiento para Pequeñas y Medianas Empresas Como Elegir el licenciamiento Correcto Preguntas y Respuestas.
Programa AER Para Socios ES Guadalupe Navarro.
Construyendo Soluciones de Aplicaciones Integradas con Formularios usando Microsoft 2007 Office System.
Overview Alejandro Ponicke Asesor de Comunidades IT Microsoft Cono Sur.
Silverlight Pablo Michelis Gerente de Relaciones Académicas Microsoft Cono Sur.
WINDOWS 7 FIN DE SOPORTE. ¿Qué es el fin de soporte? En Microsoft existe el compromiso de proporcionar productos seguros. Nuestra política mundial de.
Autenticación David Martos Arquitecto de Software. Spenta Consulting
Isabel Gómez Desarrollo & Plataforma Microsoft Ibérica.
Pasos a seguir para asociar un MCP o una persona a la empresa
 Nicolás Padula Core Technologies Consultant  Maximiliano Stibel Core Technologies Consultant.
Vendiendo Microsoft Office 2010 Office 2010 Presentación del producto Office 2010 Presentación del producto Pablo Rovira Jefe de.
Crear Referencias Febrero 10, Ingresar al portal Ingresar a la siguiente url: Ya que se haya entrado a la URL.
¿Cómo crear y lanzar la encuesta de satisfacción? (Csat) Febrero 17, 2011.
¡Bienvenido a tu nuevo Office!. ¡Instalá tu Office en todos tus dispositivos móviles! Colaboración en línea de tus archivos con todos tus compañeros de.
Access y Microsft Flow.
Office365 Telefónica España Dirección de Marketing de Empresas.
Bing SMB Advertisers – Search Ads
Microsoft Sync Framework, el futuro
Bienvenidos.
Microsoft Virtual Academy
Business Intelligence Specialist MTA Database Fundamentals MCSA SQL Server 2012/2014 MCSE Business Intelligence MCSE Data Management and Analytics.
24 Es el 6 de noviembre. Más Números
5/25/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2007 Microsoft Corporation. All rights reserved
Capítulo 12 El Futuro es tuyo 6/2/ :54 PM
First Grade Dual High Frequency Words
Mesa 2. Competitividad y Estudios Organizacionales
Optimización de SQL Server para IOT
Streaming de datos con Power BI
• SQL Server Integration Services SSIS
Expande tu audiencia de clientes con Bing Ads
Windows Server Management Marketing
11/24/2018 3:55 PM Dios es susurro y brisa,
¿Estás ahí Dios? Soy Yo, Perro...
Reconnect(); - Sevilla
(Nos agrada su presencia en este lugar)
Anuncios de Mayo 2019 Mes de las Damas
Transcripción de la presentación:

Privacidad – Una historia de desencuentros. Build 2012 4/23/2018 Privacidad – Una historia de desencuentros. Luciano Martins © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Privacidad? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Un toque de realidad. - Fairy tale -Programas de vigilancia Build 2012 4/23/2018 Un toque de realidad. - Fairy tale -Programas de vigilancia Desde que existen los gobiernos existen los programas de vigilancia, tenemos que entender que siempre estuvieron y siempre estarán, tienen un propósito, y no son un invento temporario. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Un toque de realidad. - The Coventry Blitz 'conspiracy' - “Por el bien común” Durante la Segunda Guerra Mundial, Enigma fue utilizado por el AXIS (http://en.wikipedia.org/wiki/Axis_powers) para enviar comunicaciones cifradas entre los militares alemanes. Esto les proporciona una falsa sensación de seguridad, ya que no sabían que el cifrado de Enigma se había roto. La NSA tenia la capacidad de leer tal vez cada mensaje que se envía a través del cable / radio, pero esto claramente no lo tenia que saber nadie. Y esto viene con un gran costo; vamos a ver lo que la historia nos ha dicho acerca de los costos grandes. Coventry y su gente fueron sacrificados, según la teoría, "por el bien comun" - es decir, que los beneficios de jugar al juego largo superaban a los costos a corto plazo de salir de la ciudad de West Midlands de un terrible destino "http: // www.bbc.co.uk/news/uk-11486219 "'conspiración' El Coventry Blitz" © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Un toque de realidad. - Por el bien común? Build 2012 4/23/2018 Un toque de realidad. - Por el bien común? En los tiempos actuales, no mueren personas en ataques aéreos como los de la segunda guerra mundial, pero quizás ya se a matado a la privacidad en el mundo que conocemos. Revisemos algunos programas de vigilancia. Ahora algunos de estos organismos que voy a nombrar están, en lo que ahora se llama Information Awareness Office (IAO) http://en.wikipedia.org/wiki/Information_Awareness_Office * * Miren el logo ! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Programas de vigilancia - rápido recuento TEMPEST (1950s) ECHELON (1960s) Main Core (1980) Room 641A (1990) PRISM (2007) ECHELON http://en.wikipedia.org/wiki/ECHELON Main Core https://www.eff.org/deeplinks/2008/07/salons-new-revelations-illegal-spying TEMPEST http://en.wikipedia.org/wiki/Tempest_(codename) Room 641A http://en.wikipedia.org/wiki/Room_641A PRISM http://en.wikipedia.org/wiki/PRISM_(surveillance_program) © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Programas de vigilancia - rápido recuento - Restricciones a la criptografía fuerte - Creación de sistemas vigilancia masiva. - Implementación de backdoors Recuento rapido por crypto war (The Clipper Chip) Expansión en los sistemas de vigilancia “The intelligence community has worried about ‘going dark’” Backdoors (de todos tipos y colores  ) - Crypto AG Ciphering Machines (backdoor) "He said different countries need different levels of security" - Lotus Notes: "Our customers have lost confidence in 40-bit crypto. They told us that, if we were going to continue to market 40-bit Lotus Notes overseas, we should stop marketing it as a secure system -- that we should start to call it "data scrambling" or "data masking" instead of encryption". - _NSAKEY (Windows NT 4 Service Pack 5 debate) http://en.wikipedia.org/wiki/NSAKEY - Xerox DocuColor 12 (Impresora que imprimé watermarks) forensic watermarking (Brother/Canon/Dell/Epson/Hewlett-Packard/Lexmark/Ricoh/Xerox) http://w2.eff.org/Privacy/printers/list.php - La lista es interminable ya esto parece una película de espías! Recuerden esto es por el bien común! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Una de espías © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Los denunciantes - Perry Fellwock (ECHELON) - Thomas Andrews Drake (Trailblazer) - Chelsea Manning (Afghan/Iraq War logs+) - Edward Snowden (PRISM+) - You? (TAO catalog, X-KEYSCORE) De vez en cuando, tenemos diferentes personas que ponen su vida en peligro revelando grandes secretos a estos los llamamos Los “denunciantes” Chelsea Manning (http://en.wikipedia.org/wiki/Bradley_Manning) Edward Snowden (http://en.wikipedia.org/wiki/Edward_Snowden) Hablar de la teoría del segundo y tercer leaker: https://www.schneier.com/blog/archives/2014/08/the_us_intellig.html (TAO catalog, X-KEYSCORE) © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - Ellos nos abrieron los ojos a cosas como estas? Build 2012 4/23/2018 Los denunciantes - Ellos nos abrieron los ojos a cosas como estas? Algunas de estas personas y otras quizás que nunca se releven, nos abrieron los ojos a toda una nueva era de vigilancia, miren el siguiente slide! Se llega ver bien?, esperen que lo hago mas grande. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes Build 2012 4/23/2018 Sip! Esto claramente lo tenemos que tomar con humor, sino tenemos que prender todo fuego. Hasta le pusieron una carita de feliz! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes Build 2012 4/23/2018 Parece fácil, pero bueno creo que es bastante complejo? Por lo menos se ve complejo NSA document: “20 major accesses” to undersea cables worldwide © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (ANT, TAO, XKeyscore) Build 2012 4/23/2018 Los denunciantes - NSA (ANT, TAO, XKeyscore) Todo lo que tenga hoy algún componente de software, es considerado un posible target para la implementación de backdoors, entre otras cosas estas personas y otras nos abrieron los ojos antes algunas de estas cosas: © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (XKeyscore) Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) Como ven el nivel de sofisticación es muy avanzado dependiendo de los programas internos, este es un plugin para revisar chats del facebook. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (XKeyscore) Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) Imaginen tener una base de datos de TODOS los dispositivos que un país vendió a otro, imaginen tener la lista de MAC address de todos los dispositivos de red vendidos a un país, y usar eso para identificar quizás la procedencia de un documento. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (XKeyscore) Build 2012 4/23/2018 Los denunciantes - NSA (XKeyscore) maquinas vulnerables, y muchas otras cosas. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (TAO) Build 2012 4/23/2018 Los denunciantes - NSA (TAO) Pero de donde sale toda esta masiva fuente de información, básicamente de TODAS partes. Piensen en lo siguiente, un error log mandado a la casa matriz. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - NSA (TAO) Build 2012 4/23/2018 Los denunciantes - NSA (TAO) Nmap? Si, ahí dice HTTP - El leakeage de información viene desde muchísimo tiempo, y esta gente la viene parseando desde antes que nosotros teníamos computadoras. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes - TOR Build 2012 4/23/2018 Quería parar un toque aquí, para charlar una idea que ronda mi cabeza desde hace un tiempo, en una de las presentaciones de la nsa que se llama “tor Stinks” plantea una serie de cosas que tenemos que reflexionar. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Los denunciantes Build 2012 4/23/2018 Si la NSA colecta mucha información se hunde en ella misma, no puede separar lo que sirve y lo que no sirve, lo que quizás es gente normal navegando y posibles sospechosos. Ahora bien, si la NSA tiene una lista de las personas que bajaron Tor en algún momento, o inclusive que se logean a un tor directory authority (recuerden que puedo snifear todo internet), pueden armar una lista, de las personas que quieren ser anónimas, por alguna razón. Esto claramente hace mas simple empezar a buscar una persona en particular, no?. Creo que es lo que la primera línea quiere decir, es mas fácil dedicar muchos recursos a 1 problema en particular que muchos recursos a muchos. (Espero que esto descarte a mi mama comprando cosas por internet). Entonces TOR es como un honeypot? De alguna manera? Somos todos aca targets? La gente que va a defcon? Todos los mac adresses de la red de defcon son posibles targets? HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion as well as its predecessor MixMaster Esto ya es una película, hollywood me ayudas? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Hollywood nos ayudas? Build 2012 4/23/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Catching-Up con Hollywood Build 2012 4/23/2018 Catching-Up con Hollywood En los últimos años estamos viendo de que lo que antes apreciábamos en las películas, no estaba tan lejos de la realidad en lo que respecta a usos de la información y violaciones de privacidad. Matrix (1999) (Trinity hackea la matriz usando un exploit) Conspiracy Theory (1997) (El servicio secreto, rastrea que libro es comprado) Miremos otros casos. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Catching-Up con Hollywood No solo Batman puede sniffear ilegalmente una ciudad. No solo Batman puede sniffear ilegalmente los teléfonos una ciudad, esto ya paso, 4 años antes Batman lo hiciera! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Catching-Up con Hollywood No solo Batman puede sniffear ilegalmente una ciudad. Greek Watergate (2004-2005) Foreign and Greek media have raised United States intelligence agencies as the main suspects No solo Batman puede sniffear los celulares de toda una cuidad, paso en Grecia en la época de las olimpiadas de Atenas. http://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305 PLEX programming language used by Ericsson AXE switches Kostas Tsalikidis, was found dead in an apparent suicide © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Catching-Up con Hollywood Ironman 3 Firma de calor. Build 2012 4/23/2018 Catching-Up con Hollywood Ironman 3 Firma de calor. No solo Tony Stark puede determinar por el consumo de energía una persona en particular. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Catching-Up con Hollywood Ironman 3 Firma de calor. Identificación de contenido Multimedia a través de Smart Meter - Perfiles de uso No solo Tony Stark puede determinar por el consumo de energía una persona en particular. Multimedia Content Identification Through Smart Meter Power Usage Profiles http://epic.org/privacy/smartgrid/smart_meter.pdf (el paper habla directamente que se puede en base al consumo y las firmas de consumo de los equipos electrónicos de una casa, “que cosas tiene”) Se extiende inclusive a que también se puede determinar que canal de televisión se esta viendo, dado que por el consumo de las pantallas) Tempest de nuevo? Hola? © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Hollywood deja que empeoras todo! Build 2012 4/23/2018 Hollywood deja que empeoras todo! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Ya vimos lo que el gobierno puede hacer, miremos los privados, a ver si zafamos de alguna forma! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Interconectados Build 2012 4/23/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Interconectados - GPS - Google Street View (Locación) Build 2012 4/23/2018 Interconectados - GPS - Google Street View (Locación) Vivimos en la época de estas lo mas interconectado posible, esto también nos hace quizás un toque menos consientes de la privacidad. Ejemplo 1: Ford Fiasco con GPS data Ejemplo 2: Google Street View cars WiFi Sniffing “mistakenly" collected Data © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Interconectados - Apple: iPhone Location tracking "bug" Build 2012 4/23/2018 Interconectados - Apple: iPhone Location tracking "bug" Ejemplo 3: Apple iPhone Location tracking "bug” © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Interconectados - Facebook (DeepFace) DeepFace: “Closing the Gap to Human-Level Performance in Face Verification” Facebook: Facebook’s Facial Recognition (DeepFace) DeepFace: Closing the Gap to Human-Level Performance in Face Verification 97.53% de deteccion correcta de imagenes. http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/ https://www.facebook.com/note.php?note_id=10150162289525301 “For this reason, your name and profile picture do not have privacy settings” © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Interconectados - Android Build 2012 4/23/2018 Interconectados - Android Android: Wifi Password backup (Fiasco) Android 2.2 Froyo http://arstechnica.com/security/2013/07/does-nsa-know-your-wifi-password-android-backups- may-give-it-to-them/ Si, ellos tienen todos los passwords de wifi que te conectastes. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Interconectados - Google Profiling Build 2012 4/23/2018 Interconectados - Google Profiling Google: Profiling Dos computadoras en diferentes lugares: Search FF, una computadora Foo Fighters, otra Final Fantasy, ambas computadoras en la misma ciudad. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Todo bien y ahora que? Build 2012 4/23/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Lo que tenemos que empezar a pensar. Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. - Tomemos conciencia - Alternativas. Closing notes: Tenemos que tomar conciencia el valor de la privacidad, que cosas desde nuestro lado podemos intentar conservar, y que cosas tenemos que hacer lo mas difícil posible decodificar. Encripta la comunicación en todo lo que puedas. Usa strong cripto Toma recaudos de la información que compartes en las redes sociales, quizás esto puede ser usado para crear un mejor perfil de tu mismo. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Lo que tenemos que empezar a pensar. - Alternativas. Build 2012 4/23/2018 Lo que tenemos que empezar a pensar. - Alternativas. Hoy en día existen muchas alternativas para hacer mas difícil las cosas que no podemos controlar. Tox Bitmessage Invisible.im Silent Circle BitTorrent Sync PGP © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2012 4/23/2018 No olvidemos. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Héroes En la antigüedad, los hombres miraban a las estrellas y Build 2012 4/23/2018 Héroes Thomas Andrews Drake Chelsea (formerly Bradley) Manning Perry Fellwock Edward Snowden En la antigüedad, los hombres miraban a las estrellas y veían a sus héroes en las constelaciones. en los tiempos modernos, se hace lo mismo, pero nuestros héroes son hombres épicos de carne y hueso. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.